Back

Welcome “Frappo” – The new Phishing-as-a-Service used by Cybercriminals to attack customers of major financial institutions and online-retailers

Cybercrime Intelligence

phishing, phishing-as-a-service, frappo, dark web

Welcome “Frappo” – The new Phishing-as-a-Service used by Cybercriminals to attack customers of major financial institutions and online-retailers

The Resecurity HUNTER unit identified a new underground service called “Frappo”, which is available in the Dark Web. “Frappo” enables cybercriminals the ability to host and generate high-quality phishing pages which impersonate major online-banking, e-commerce, popular retailers, and online-services to steal customer data.



“Frappo” acts as a Phishing-as-a-Service – providing anonymous billing, technical support, updates, and the tracking of collected credentials via a dashboard. Initially, the service popped up in the Dark Web around 22ndMarch, 2021, and has been significantly upgraded since then.


frappo phishing-as-a-service dark web
Frappo – The new Phishing-as-a-Service has emerged in the Dark Web




Most recently, it provided phishing pages for over 20 financial institutions (FIs), online-retailers and popular services such as Uber.

It’s worth noting, upon first inspection “Frappo” was designed to be an anonymous cryptocurrency wallet. However, the project with a similar name is currently available on GitHub (https://github.com/FrappoWallet/FrappoWallet) which allows software developers to integrate payment methods which support Ethereum and Bitcoin. Technically, it is a “MetaMask-like” browser extension providing the ability to browse blockchain enabled websites.


Frappo
Frappo Wallet



“Frappo” is completely anonymous and doesn’t require a threat actor to register an account.


frappo anonymous frappowallet
No usernames, no passwords, no names



“Frappo” claims to guarantee end users high anonymity and encryption which is a very attractive component for cybercriminals:


frappo faq anonymity encryption cybercriminal
Frappo's FAQs



Cybercriminals are granted the ability to work with stolen data anonymously and in an encrypted format:


frappo encryption vps chrome firefox extension
When the encryption begins



Interestingly, the actors were able to publish “Frappo” in the Chrome Store, this was done in the form of an extension which grants instant activation:

https://chrome.google.com/webstore/detail/frappo/mhoekmcdfpahflkdfgejnnjjigbagbpl


frappo approved google chrome store extension browser
Frappo being approved and listed on the Google Chrome Store



According to users’ feedback, it’s unlikely this extension is for good purposes, and could be used to steal personal data:


frappo extension review opinion users personal information theft
User reviews of Frappo



To activate the extension, all that’s needed is to install the browser plugin on FireFox or Google Chrome, and then proceed further with a payment.


frappo activation extension browser plugin firefox google chrome
To activate the Frappo extension...



The authors of “Frappo” provide several payments plans for cybercriminals depending on their chosen duration of the subscription. Like a SaaS-based services and platform for legitimate businesses, “Frappo” allows cybercriminals to minimize costs for the development of phishing-kits, and to use the same on the bigger scale.


frappo monthly quarterly yearly subscription plans tariffs
Frappo subscription tariffs



Customer support is available via a secure Telegram IM, and in the group are over 1,965 members – this is highly likely where other cybercriminals discuss how successful they’ve been attacking the customers of various online-services, or to request additional assistance.


frappo secure telegram im group successful cybercriminal
Frappo's secure Telegram group with over 1,965 members



Once “Frappo” is activated, the operator will see the following navigation menu allowing them to generate a new phishing page (or “phishlet”) followed by the ability to host it:

1 - New update

2 - New Pages

3 - Edit servers

4 - Faster Page Upload

5 - Page Visitors

6 - General Fixes

“Frappo” then provides an interactive wizard allowing the operator to configure settings, define server credentials, and choose the brand to impersonate. The available phishing pages are categorized by brand and profile:


frappo add server usa phishing page brand category
Frappo server configuration...



Category “SINGLE BANKS” includes major financial institutions from Canada:

  • Scotia
  • BMO
  • CIBC
  • ATB
  • RBC
  • Tangerine
  • TD
  • Desjardins



Category “INTERAC” includes various customized phishing templates to steal payment data and credit card details:

  • Fullz
  • Custom
  • Costco



Category “USA” includes phishing pages with designs surrounding major financial institutions in the U.S.:

  • M&T
  • Wells Fargo
  • Netflix USA
  • Chase
  • Citizens
  • Citi
  • BOA



Category “OTHERS” includes phishing pages for well-known e-mail and customer authorization front-ends:

  • Roundcuble
  • TELUS Profile
  • Email Adapter



Category “CVV FULLZ” includes various templates designed as popular consumer apps including online-retailer, TV streaming, and major ISP:

  • Amazon
  • Uber
  • Netflix
  • Rogers



Notably, the templates used for credit card data interception supports multiple payment systems which include AMEX, Discover, Diners, Mastercard, UnionPay and even Russian MYR.

// starts with 34/37; 15 digits

amex: /^3[47]\d{0,13}/,

// starts with 6011/65/644-649; 16 digits

discover: /^(?:6011|65\d{0,2}|64[4-9]\d?)\d{0,12}/,

// starts with 300-305/309 or 36/38/39; 14 digits

diners: /^3(?:0([0-5]|9)|[689]\d?)\d{0,11}/,

// starts with 51-55/2221–2720; 16 digits

mastercard: /^(5[1-5]\d{0,2}|22[2-9]\d{0,1}|2[3-7]\d{0,2})\d{0,12}/,

// starts with 5019/4175/4571; 16 digits

dankort: /^(5019|4175|4571)\d{0,12}/,

// starts with 637-639; 16 digits

instapayment: /^63[7-9]\d{0,13}/,

// starts with 2131/1800; 15 digits

jcb15: /^(?:2131|1800)\d{0,11}/,

// starts with 2131/1800/35; 16 digits

jcb: /^(?:35\d{0,2})\d{0,12}/,

// starts with 50/56-58/6304/67; 16 digits

maestro: /^(?:5[0678]\d{0,2}|6304|67\d{0,2})\d{0,12}/,

// starts with 22; 16 digits

mir: /^220[0-4]\d{0,12}/,

// starts with 4; 16 digits

visa: /^4\d{0,15}/,

// starts with 62/81; 16 digits

unionPay: /^(62|81)\d{0,14}/

},

Interestingly, one of the recent updates issued on April 22nd, “Frappo” began supporting PINs interception to trick victims into entering it:


frappo updates changelog
Frappo is being updated all the time!



Cybercriminals may use their own VDS/VPS or bulletproof servers to integrate “Frappo”. After the server credentials have been defined, the operator is then asked to configure the phishing campaign tracking settings. The service also provides a Free SSL Certificate generation service enabling the delivery of phishing content via a secure HTTPS connection.


frappo server configuration settings vds vps ssl certificate generation
Adding more configuration setting to the server



Additional configuration options enable mobile versions of phishing pages which target victims using mobile devices or tables like Apple iPhone, iPad, or Google Android. “Frappo” also provides “Geo Lock” options which allow filtering hosts accessing the phishing kit, making it strictly available to victims from particular regions, e.g. the U.S.:


frappo server configuration settings
Frappo server config and email details



Once the instance is properly configured, the server will be visible in the listing with further statistical data being collection – such as how many victims opened the phishing page, accessed authorization and entered credentials, uptime, and the server status (in the event it gets banned by an ISP or hosting provider). If the server goes offline, “Frappo” will send an alert via a Telegram notification.


frappo server setting setup
Frappo service and server status panel



Compromised credentials will be visible in the “Logs” section with additional details about each victim (IP address, User-Agent, Username, Password, Referrer, and etc.):


credentials logs IP address User-Agent Username Password Referrer
Logs of compromised credentials and much more



Resecurity HUNTER team was able to analyze the installation process and packages delivered by the “Frappo” server-side via SSH. The service drops interactive installation packages allowing deployment of the phishing-kit, and enables an API to “Frappo” for further statistics collection, management, and updates. Notably, the actors request SSH credentials with significant privileges, this is done because they’re also installing additional services in the system which include the addition of a user. Such tactics could then be used for potential credential theft of other cybercriminals who use “Frappo” – what has been detected on practice by various password stealers and online-banking trojans having hidden backdoors or vulnerabilities allowing the authors to profit.

The transfer of files via SSH has been registered from IP 192[.]227[.]131[.]120, this is one of the nodes the actors use to distribute Docker images and files with “Frappo”.

“Frappo” transfers a Docker container which contains a set of scripts written in Bash for further deployment. It’s worth noting, after the installation process is complete, all logs and executed commands are erased. We were able to log some of the commands used during and after the installation to obtain additional insight:


bash docker container command erased frappo
Frappo transfers a Docker container containing a set of scripts



Some of the most noteworthy commands contained references to several archives “Frappo” downloads from the remote hosting which include – “webpage.zip” and “encryption.tar”.

rm -f -- .//alternatives.tar.6 .//alternatives.tar.6.gz

rm -f -- .//dpkg.statoverride.6 .//dpkg.statoverride.6.gz

rm -f -- .//dpkg.diversions.6 .//dpkg.diversions.6.gz

rm -f -- .//dpkg.status.6 .//dpkg.status.6.gz

find /var/crash/. ! -name . -prune -type d -regextype posix-extended -regex .*/[0-9]{12}$ ( -mtime +7 ) -exec rm -Rf -- {} ;

find /var/crash/. ! -name . -prune -type f ( ( -size 0 -a ! -name *.upload* -a ! -name *.drkonqi* ) -o -mtime +7 ) -exec rm -f -- {} ;

xargs -r -0 rm -f

rm -f -- .//apt.extended_states.6 .//apt.extended_states.6.gz

rm -rf /etc/caddy/Caddyfile.dpkg-dist

rm -rf /root/webpage.zip

rm -rf /root/encryption.tar

rm -rf /usr/share/caddy

rm -f /tmp/ipp

rm -rf /tmp/os-prober.gu4DFd

rm -rf /tmp/os-prober.r0gY15

rm -f /var/lib/os-prober/labels

rm -f /boot/grub/grub.cfg.new

rm -f /tmp/apt-fast.lock

rm -f -- /tmp/apt-fast.list

rm -f /var/lib/update-notifier/tmp.CrECFEsHye

rm -rf /tmp/apt-key-gpghome.SvmsPAgdtl



Here we can see the archive “webpage.zip” which contains a set of scripts:


frappo downloaded webpage zip file content
The contents of webpage.zip



And here we can see the archive “encrypted.tar” which contains Docker and other configuration files:


encrypted docker files repositories manifest
The content of encrypt.tar which contains Docker



[{"Config":"c91d74ca10851028e1fa7cc38599ad33233f97ff624dfc64fd8c226d8dd22754.json","RepoTags":["frappo/encryption:1.0.1"],"Layers":["304e424bc2d24962ebf3497697c15f6c58bb58a8bf58832fa5286f30d0d36285/layer.tar","1e77e45bc7c8fdb4227d61e7ca4534939bb61b1496a18a14f839ae7688b9394a/layer.tar","aee06ab82ce518b9bbef5b8995a39b81819db5a25e34e34166ecf36015e13e59/layer.tar","f7f9d2fd1e77db57df6e7e765a183187148131e18204cad0964106d7b02a9ab9/layer.tar","b73510054aa60007eb8f8d3be9a03d4d67a30b3ce0ce4686ca01bd2af356cc97/layer.tar","a65159f8298ca3fb09ce7ab68fb77b19b66cea05541afce797100dee9c1be1d6/layer.tar","57a897380d71f45cd7dbb1e5073ee0598d0385dc2dc54149f3b1d41ccd3af396/layer.tar","f7c04bc902dfcb0b0f30c6f2c4eda7cfe17c3a0c0469be0975df85ae37f99dec/layer.tar"]}]

We also identified a “.env” file which contained key settings and public keys to encrypt logs which will then later be delivered to “Frappo” via API:


key settings encrypted logs frappo api public
An identified .env file contains key settings



The observed phishing pages (or “phishlets”) are high-quality and contain interactive scenarios which trick the victims into entering authorization credentials.

Phishing-as-a-Service like “Frappo” are successfully used by threat actors for things like Account Takeover (ATO), Business Email Compromise (BEC), Payment and Identity Data Theft.

Cybercriminals are forever leveraging advanced tools and tactics to attack consumers globally. The protection of digital identity becomes one of the top key priorities for online-safety, and a subsequently becomes a new digital battlefield – wherein threat actors are hunting on stolen data.

Resecurity® is committed to protecting consumers and enterprises all over the globe, and is actively involved in public-private partnerships to share actionable cyber threat intelligence (CTI) with financial institutions, technology companies and law enforcement to ultimately minimize the risk of credentials being compromised and data breaches being executed. Resecurity® is an Affiliate Member of FS-ISAC and an Official Member of Infragard who aim to combat cybercriminal activity targeting financial services and Internet users.

Newsletter

Keep up to date with the latest cybersecurity news and developments.

By subscribing, I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy

Cloud Architecture
Cloud Architecture
445 S. Figueroa Street
Los Angeles, CA 90071
Google Maps
Contact us by filling out the form.
Try Resecurity products today with a free trial